9.3
CVSSv2

CVE-2007-5849

Published: 19/12/2007 Updated: 29/07/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 up to and including 1.3.4 allows remote malicious users to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

easy_software_products cups 1.3.3

easy_software_products cups 1.2.10

easy_software_products cups 1.2.12

easy_software_products cups 1.2.4

easy_software_products cups 1.2.9

Vendor Advisories

Wei Wang discovered that the SNMP discovery backend did not correctly calculate the length of strings If a user were tricked into scanning for printers, a remote attacker could send a specially crafted packet and possibly execute arbitrary code ...
Debian Bug report logs - #456960 cupsys: CVE-2007-6358 insecure file handling in pdftops filter script Package: cupsys; Maintainer for cupsys is (unknown); Reported by: Nico Golde <nion@debianorg> Date: Tue, 18 Dec 2007 18:21:04 UTC Severity: important Tags: security Fixed in version cupsys/135-1 Done: Kenshi Muto &lt ...
Debian Bug report logs - #457453 cupsys: CVE-2007-5849 stack-based buffer overflow leading to code execution in SNMP back-end Package: cupsys; Maintainer for cupsys is (unknown); Reported by: Nico Golde <nion@debianorg> Date: Sat, 22 Dec 2007 14:33:01 UTC Severity: grave Tags: patch, security Found in versions cupsys/12 ...
Several local vulnerabilities have been discovered in the Common UNIX Printing System The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5849 Wei Wang discovered that an buffer overflow in the SNMP backend may lead to the execution of arbitrary code CVE-2007-6358 Elias Pipping ...

Exploits

source: wwwsecurityfocuscom/bid/26917/info Common UNIX Printing System (CUPS) is prone to a remote buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer Exploiting this issue allows attackers to execute arbitrary machine code in the contex ...